Knowledge (XXG)

Dependability

Source đź“ť

1942: 1952: 1962: 290:
a failure is said to occur. A failure is basically the point at which it can be said that a service is failing to meet its specification. Since the output data from one service may be fed into another, a failure in one service may propagate into another service as a fault so a chain can be formed of the form: Fault leading to Error leading to Failure leading to Error, etc.
184: 289:
Once a fault is activated an error is created. An error may act in the same way as a fault in that it can create further error conditions, therefore an error may propagate multiple times within a system boundary without causing an observable failure. If an error propagates outside the system boundary
276:
Error: An error is a discrepancy between the intended behavior of a system and its actual behavior inside the system boundary. Errors occur at runtime when some part of the system enters an unexpected state due to the activation of a fault. Since errors are generated from invalid states they are hard
81:
develops and maintains international standards that provide systematic methods and tools for dependability assessment and management of equipment, services, and systems throughout their life cycles. The IFIP Working Group 10.4 on "Dependable Computing and Fault Tolerance" plays a role in synthesizing
285:
It is important to note that Failures are recorded at the system boundary. They are basically Errors that have propagated to the system boundary and have become observable. Faults, Errors and Failures operate according to a mechanism. This mechanism is sometimes known as a Fault-Error-Failure chain.
272:
Fault: A fault (which is usually referred to as a bug for historic reasons) is a defect in a system. The presence of a fault in a system may or may not lead to a failure. For instance, although a system may contain a fault, its input and state conditions may never cause this fault to be executed so
234:
As these definitions suggested, only Availability and Reliability are quantifiable by direct measurements whilst others are more subjective. For instance Safety cannot be measured directly via metrics but is a subjective assessment that requires judgmental information to be applied to give a level
280:
Failure: A failure is an instance in time when a system displays behavior that is contrary to its specification. An error may not necessarily cause a failure, for instance an exception may be thrown by a system but this may be caught and handled using fault tolerance techniques so the overall
286:
As a general rule a fault, when activated, can lead to an error (which is an invalid state) and the invalid state generated by an error may lead to another error or a failure (which is an observable deviation from the specified behavior at the system boundary).
321:
Removal during development requires verification so that faults can be detected and removed before a system is put into production. Once systems have been put into production a system is needed to record failures and remove them via a maintenance cycle.
380:
The flexibility of current frameworks encourage system architects to enable reconfiguration mechanisms that refocus the available, safe resources to support the most critical services rather than over-provisioning to build failure-proof system.
298:
Since the mechanism of a Fault-Error-Chain is understood it is possible to construct means to break these chains and thereby increase the dependability of a system. Four means have been identified so far:
529:
is an open access journal that provides an international forum for the electronic publication of original research and industrial experience articles in all areas of systems dependability and prognostics.
874:
Moradi, Mehrdad, Bentley James Oakes, Mustafa Saraoglu, Andrey Morozov, Klaus Janschek, and Joachim Denil. "Exploring Fault Parameter Space Using Reinforcement Learning-based Fault Injection." (2020).
257:. Security is sometimes classed as an attribute but the current view is to aggregate it together with dependability and treat Dependability as a composite term called Dependability and Security. 406: 136: 135:
The field of dependability has evolved from these beginnings to be an internationally active field of research fostered by a number of prominent international conferences, notably the
331:
deals with putting mechanisms in place that will allow a system to still deliver the required service in the presence of faults, although that service may be at a degraded level.
520: 316:
Fault Prevention deals with preventing faults being introduced into a system. This can be accomplished by use of development methodologies and good implementation techniques.
70:
is the ability to provide services that can be trusted within a time-period. The service guarantees must hold even when the system is subject to attacks or natural failures.
767: 738:, "Software Dependability: A Personal View", in the Proc of the 25th International Symposium on Fault-Tolerant Computing (FTCS-25), California, USA, pp 35-41, June 1995. 260:
Practically, applying security measures to the appliances of a system generally improves the dependability by limiting the number of externally originated errors.
803: 985: 113:
Some sources hold that word was coined in the nineteen-teens in Dodge Brothers automobile print advertising. But the word predates that period, with the
78: 74: 747:
J.C. Laprie. "Dependable Computing and Fault Tolerance: Concepts and terminology," in Proc. 15th IEEE Int. Symp. on Fault-Tolerant Computing, 1985
699: 1695: 1667: 120:
As interest in fault tolerance and system reliability increased in the 1960s and 1970s, dependability came to be a measure of as measures of
1720: 827: 268:
Threats are things that can affect a system and cause a drop in Dependability. There are three main terms that must be clearly understood:
1571: 852:"Optimizing fault injection in FMI co-simulation through sensitivity partitioning | Proceedings of the 2019 Summer Simulation Conference" 1725: 1004: 1237: 1877: 1705: 1242: 553: 430: 802:
Moradi, Mehrdad; Van Acker, Bert; Vanherpen, Ken; Denil, Joachim (2019). Chamberlain, Roger; Taha, Walid; Törngren, Martin (eds.).
630: 1965: 1066: 496:
International Symposium on Dependable Systems and Networks (DSN): Flagship conference of the community, annually held since 1970.
1353: 888: 1606: 377:, thus taking into account the degraded services that an Information System sustains or resumes after a non-maskable failure. 1986: 1644: 1270: 978: 634: 397:
is defined as "quantifying how well the object system performs in the presence of faults over a specified period of time".
1786: 1763: 1493: 1483: 368: 187:
Taxonomy showing relationship between Dependability & Security and Attributes, Threats and Means (after Laprie et al.)
523:
is the flagship journal that comes under the purview of the IEEE Technical Committee on Fault Tolerant Computing (TCFTC).
1867: 1455: 1363: 1275: 1051: 1036: 128:
as the term to encompass studies of fault tolerance and system reliability without the extension of meaning inherent in
1996: 1955: 1690: 1195: 124:
came to encompass additional measures like safety and integrity. In the early 1980s, Jean-Claude Laprie thus chose
1927: 1576: 82:
the technical community's progress in the field and organizes two workshops each year to disseminate the results.
1945: 1872: 1847: 1710: 1358: 971: 580: 114: 1796: 1629: 1222: 1091: 334:
Dependability means are intended to reduce the number of failures made visible to the end users of a system.
2006: 1857: 1791: 1682: 1498: 1165: 483: 445: 349:
Intermittent: They appear multiple times, possibly without a discernible pattern, and disappear on their own
319:
Fault Removal can be sub-divided into two sub-categories: Removal During Development and Removal During Use.
209: 155: 121: 325:
Fault Forecasting predicts likely faults so that they can be removed or their effects can be circumvented.
1922: 1753: 1634: 1401: 1391: 1386: 602: 191:
Attributes are qualities of a system. These can be assessed to determine its overall dependability using
1892: 1862: 1852: 1748: 1662: 1538: 1478: 1445: 1435: 1325: 1290: 1280: 1217: 1086: 1061: 1056: 1021: 454: â€“ Engineering discipline which assures that engineered systems provide acceptable levels of safety 196: 1652: 1624: 1596: 1591: 1420: 1396: 1348: 1333: 1315: 1305: 1300: 1262: 1212: 1207: 1124: 1070: 647: 1917: 1842: 1758: 1743: 1508: 1295: 1252: 1247: 1144: 1134: 1106: 471: 63: 31: 1882: 1781: 1657: 1614: 1523: 1465: 1450: 1440: 1232: 1031: 833: 510:
Pacific Rim International Symposium on Dependable Computing (PRDC): Its 25th offering is in 2021.
451: 363: 2001: 1902: 1832: 1811: 1773: 1581: 1548: 1528: 1227: 1139: 1013: 823: 549: 499:
International Symposium on Reliable Distributed Systems (SRDS): Its 40th offering is in 2021.
2011: 1735: 1619: 1586: 1381: 1310: 1199: 1185: 1180: 1129: 1116: 1041: 994: 815: 620:
Rigorous Open Development Environment for Complex Systems FP6/IST targeted project 2004–2007
192: 1991: 1806: 1700: 1672: 1566: 1518: 1503: 1488: 1343: 1338: 1285: 1175: 1149: 1101: 1046: 892: 651: 479: 418: 412: 328: 246: 238: 227: 159: 762: 346:
Transient: They appear without apparent cause and disappear again without apparent cause
1912: 1816: 1715: 1561: 1533: 424: 792:, "Fundamental Concepts of Dependability," presented at ISW-2000, Cambridge, MA, 2000. 507:
Latin-American Symposium on Dependable Computing (LADC): Its 10th offering is in 2021.
1980: 1801: 851: 837: 789: 757: 735: 695: 386: 373: 885: 17: 1897: 1556: 906: 254: 203: 151: 702:," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004. 478:
Stefano Porcarelli, Marco Castaldi, Felicita Di Giandomenico, Andrea Bondavalli,
277:
to observe without special mechanisms, such as debuggers or debug output to logs.
273:
that an error occurs; and thus that particular fault never exhibits as a failure.
1887: 1513: 1425: 819: 1907: 1837: 1430: 1170: 1026: 98:- an understanding of the things that can affect the dependability of a system 804:"Model-Implemented Hybrid Fault Injection for Simulink (Tool Demonstrations)" 1412: 1373: 250: 221: 484:
An Approach to Manage Reconfiguration in Fault-Tolerant Distributed Systems
448: â€“ Sub-discipline of systems engineering that emphasizes dependability 199:
measures. Avizienis et al. define the following Dependability Attributes:
1473: 235:
of confidence, whilst Reliability can be measured as failures over time.
218:- absence of catastrophic consequences on the user(s) and the environment 167: 532: 215: 163: 526: 963: 415: â€“ Testing how computer systems behave under unusual stresses 393:
To take into account the level of performance, the measurement of
352:
Permanent: Once they appear, they do not get resolved on their own
245:
is also used when addressing security. Security is a composite of
182: 144: 886:
Towards a Rigorous Definition of Information System Survivability
712: 436: 390:
was introduced to give greater importance to users' experience.
183: 140: 967: 943: 597:
European security Forum for Web Services, Software, and Systems
586: 342:
Based on how faults appear or persist, they are classified as:
700:
Basic Concepts and Taxonomy of Dependable and Secure Computing
679: 919: 421: â€“ Resilience of systems to component failures or errors 617: 611: 779:
I. Sommerville, Software Engineering: Addison-Wesley, 2004.
690: 688: 521:
IEEE Transactions on Dependable and Secure Computing (TDSC)
439: â€“ Engineering characterization of a product or system 407:
International Conference on Dependable Systems and Networks
145:
International Symposium on Software Reliability Engineering
137:
International Conference on Dependable Systems and Networks
639:
System for Terrorism Intervention and Large-scale Teamwork
384:
With the generalisation of networked information systems,
281:
operation of the system will conform to the specification.
644: 433: â€“ Non-functional requirements for system evaluation 883:
John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan:
682:, select 192 Dependability, see 192-01-22 Dependability. 577:
DEpendability and Security by Enhanced REConfigurability
572: 533:
International Journal of Critical Computer-Based Systems
907:
Specification and construction of performability models
441:
Pages displaying short descriptions of redirect targets
150:
Traditionally, dependability for a system incorporates
141:
International Symposium on Reliable Distributed Systems
560:
Reliable Computer Systems : Design and Evaluation
357:
Dependability of information systems and survivability
85:
Dependability can be broken down into three elements:
243:
the absence of unauthorized disclosure of information
1825: 1772: 1734: 1681: 1643: 1605: 1547: 1464: 1410: 1372: 1324: 1261: 1194: 1158: 1115: 1079: 1012: 50:, and in some cases, other characteristics such as 814:. Cham: Springer International Publishing: 71–90. 625:System Engineering for Security and Dependability 562:, A K Peters/CRC Press, 1998. ISBN 978-1568810928 606:HIghly DEpendable ip-based NETworks and Services 92:- a way to assess the dependability of a system 170:have been added to measures of dependability. 1003:Note: This template roughly follows the 2012 979: 788:A. Avizienis, V. Magnus U, J. C. Laprie, and 546:Dependability: Basic Concepts and Terminology 8: 361:Some works on dependability use structured 427: â€“ Mathematical program specifications 104:- ways to increase a system's dependability 986: 972: 964: 808:Cyber Physical Systems. Model-Based Design 655:Dependable and Secure Service Composition 75:International Electrotechnical Commission 230:- ability for easy maintenance (repair) 224:- absence of improper system alteration 667: 614:FP6/IST Network of Excellence 2006–2007 1696:Knowledge representation and reasoning 657:, FP7/IST integrated project 2010–2014 627:, FP6/IST integrated project 2006–2008 558:Daniel P. Siewiorek, Robert S. Swarz, 409: â€“ Computer networking conference 1721:Philosophy of artificial intelligence 810:. Lecture Notes in Computer Science. 763:Fundamental Concepts of Dependability 503:More regionally focused conferences: 7: 1047:Energy consumption (Green computing) 608:, FP6/IST targeted project 2006–2008 472:Software Fault Tolerance: A Tutorial 1726:Distributed artificial intelligence 1005:ACM Computing Classification System 77:(IEC), via its Technical Committee 1238:Integrated development environment 904:John F. Meyer, William H. Sanders 676:Electropedia del 192 Dependability 25: 1706:Automated planning and scheduling 1243:Software configuration management 713:"Dependable Systems and Networks" 631:Willow Survivability Architecture 583:/IST integrated project 2006–2008 431:List of system quality attributes 1960: 1950: 1941: 1940: 1951: 1354:Computational complexity theory 756:A. Avizienis, J.-C. Laprie and 212:- continuity of correct service 206:- readiness for correct service 117:finding its first use in 1901. 1145:Network performance evaluation 27:Measure in systems engineering 1: 1509:Multimedia information system 1494:Geographic information system 1484:Enterprise information system 1080:Computer systems organization 599:, FP6/IST coordination action 591:Network on DEpendable Systems 371:, to introduce the attribute 1868:Computational social science 1456:Theoretical computer science 1276:Software development process 1052:Electronic design automation 1037:Very Large Scale Integration 694:A. Avizienis, J.-C. Laprie, 1691:Natural language processing 1479:Information storage systems 820:10.1007/978-3-030-23703-5_4 766:. Research Report No 1145, 680:http://www.electropedia.org 38:is a measure of a system's 2028: 1607:Human–computer interaction 1577:Intrusion detection system 1489:Social information systems 1474:Database management system 1936: 1873:Computational engineering 1848:Computational mathematics 1001: 548:, Springer-Verlag, 1992. 469:Wilfredo Torres-Pomales: 174:Elements of dependability 115:Oxford English Dictionary 1883:Computational healthcare 1878:Differentiable computing 1797:Graphics processing unit 1223:Domain-specific language 1092:Computational complexity 1858:Computational chemistry 1792:Photograph manipulation 1683:Artificial intelligence 1499:Decision support system 446:Reliability engineering 1923:Educational technology 1754:Reinforcement learning 1504:Process control system 1402:Computational geometry 1392:Algorithmic efficiency 1387:Analysis of algorithms 1042:Systems on Chip (SoCs) 188: 1987:Computing terminology 1893:Electronic publishing 1863:Computational biology 1853:Computational physics 1749:Unsupervised learning 1663:Distributed computing 1539:Information retrieval 1446:Mathematical analysis 1436:Mathematical software 1326:Theory of computation 1291:Software construction 1281:Requirements analysis 1159:Software organization 1087:Computer architecture 1057:Hardware acceleration 1022:Printed circuit board 717:www.dependability.org 186: 162:but since the 1980s, 1653:Concurrent computing 1625:Ubiquitous computing 1597:Application security 1592:Information security 1421:Discrete mathematics 1397:Randomized algorithm 1349:Computability theory 1334:Model of computation 1306:Software maintenance 1301:Software engineering 1263:Software development 1213:Programming language 1208:Programming paradigm 1125:Network architecture 768:Lydford g DrAAS-CNRS 698:, and C. Landwehr, " 18:Dispatch reliability 1928:Document management 1918:Operations research 1843:Enterprise software 1759:Multi-task learning 1744:Supervised learning 1466:Information systems 1296:Software deployment 1253:Software repository 1107:Real-time computing 948:srds-conference.org 527:Prognostics Journal 364:information systems 64:real-time computing 32:systems engineering 1997:Safety engineering 1711:Search methodology 1658:Parallel computing 1615:Interaction design 1524:Computing platform 1451:Numerical analysis 1441:Information theory 1233:Software framework 1196:Software notations 1135:Network components 1032:Integrated circuit 891:2006-10-29 at the 650:2019-12-02 at the 452:Safety engineering 189: 1974: 1973: 1903:Electronic voting 1833:Quantum Computing 1826:Applied computing 1812:Image compression 1582:Hardware security 1572:Security services 1529:Digital marketing 1316:Open-source model 1228:Modeling language 1140:Network scheduler 924:dsn2022.github.io 829:978-3-030-23703-5 567:Research projects 16:(Redirected from 2019: 1964: 1963: 1954: 1953: 1944: 1943: 1764:Cross-validation 1736:Machine learning 1620:Social computing 1587:Network security 1382:Algorithm design 1311:Programming team 1271:Control variable 1248:Software library 1186:Software quality 1181:Operating system 1130:Network protocol 995:Computer science 988: 981: 974: 965: 958: 957: 955: 954: 940: 934: 933: 931: 930: 916: 910: 902: 896: 881: 875: 872: 866: 865: 863: 862: 848: 842: 841: 799: 793: 786: 780: 777: 771: 754: 748: 745: 739: 733: 727: 726: 724: 723: 709: 703: 692: 683: 672: 442: 21: 2027: 2026: 2022: 2021: 2020: 2018: 2017: 2016: 1977: 1976: 1975: 1970: 1961: 1932: 1913:Word processing 1821: 1807:Virtual reality 1768: 1730: 1701:Computer vision 1677: 1673:Multiprocessing 1639: 1601: 1567:Security hacker 1543: 1519:Digital library 1460: 1411:Mathematics of 1406: 1368: 1344:Automata theory 1339:Formal language 1320: 1286:Software design 1257: 1190: 1176:Virtual machine 1154: 1150:Network service 1111: 1102:Embedded system 1075: 1008: 997: 992: 962: 961: 952: 950: 942: 941: 937: 928: 926: 918: 917: 913: 903: 899: 893:Wayback Machine 882: 878: 873: 869: 860: 858: 850: 849: 845: 830: 801: 800: 796: 787: 783: 778: 774: 755: 751: 746: 742: 734: 730: 721: 719: 711: 710: 706: 693: 686: 673: 669: 664: 652:Wayback Machine 569: 541: 517: 493: 480:Paola Inverardi 466: 461: 459:Further reading 440: 419:Fault tolerance 413:Fault injection 403: 359: 340: 329:Fault Tolerance 320: 296: 266: 247:Confidentiality 239:Confidentiality 228:Maintainability 181: 176: 160:maintainability 111: 48:maintainability 28: 23: 22: 15: 12: 11: 5: 2025: 2023: 2015: 2014: 2009: 2007:Formal methods 2004: 1999: 1994: 1989: 1979: 1978: 1972: 1971: 1969: 1968: 1958: 1948: 1937: 1934: 1933: 1931: 1930: 1925: 1920: 1915: 1910: 1905: 1900: 1895: 1890: 1885: 1880: 1875: 1870: 1865: 1860: 1855: 1850: 1845: 1840: 1835: 1829: 1827: 1823: 1822: 1820: 1819: 1817:Solid modeling 1814: 1809: 1804: 1799: 1794: 1789: 1784: 1778: 1776: 1770: 1769: 1767: 1766: 1761: 1756: 1751: 1746: 1740: 1738: 1732: 1731: 1729: 1728: 1723: 1718: 1716:Control method 1713: 1708: 1703: 1698: 1693: 1687: 1685: 1679: 1678: 1676: 1675: 1670: 1668:Multithreading 1665: 1660: 1655: 1649: 1647: 1641: 1640: 1638: 1637: 1632: 1627: 1622: 1617: 1611: 1609: 1603: 1602: 1600: 1599: 1594: 1589: 1584: 1579: 1574: 1569: 1564: 1562:Formal methods 1559: 1553: 1551: 1545: 1544: 1542: 1541: 1536: 1534:World Wide Web 1531: 1526: 1521: 1516: 1511: 1506: 1501: 1496: 1491: 1486: 1481: 1476: 1470: 1468: 1462: 1461: 1459: 1458: 1453: 1448: 1443: 1438: 1433: 1428: 1423: 1417: 1415: 1408: 1407: 1405: 1404: 1399: 1394: 1389: 1384: 1378: 1376: 1370: 1369: 1367: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1330: 1328: 1322: 1321: 1319: 1318: 1313: 1308: 1303: 1298: 1293: 1288: 1283: 1278: 1273: 1267: 1265: 1259: 1258: 1256: 1255: 1250: 1245: 1240: 1235: 1230: 1225: 1220: 1215: 1210: 1204: 1202: 1192: 1191: 1189: 1188: 1183: 1178: 1173: 1168: 1162: 1160: 1156: 1155: 1153: 1152: 1147: 1142: 1137: 1132: 1127: 1121: 1119: 1113: 1112: 1110: 1109: 1104: 1099: 1094: 1089: 1083: 1081: 1077: 1076: 1074: 1073: 1064: 1059: 1054: 1049: 1044: 1039: 1034: 1029: 1024: 1018: 1016: 1010: 1009: 1002: 999: 998: 993: 991: 990: 983: 976: 968: 960: 959: 935: 911: 897: 876: 867: 843: 828: 794: 781: 772: 749: 740: 728: 704: 684: 666: 665: 663: 660: 659: 658: 642: 628: 621: 615: 609: 600: 593: 584: 568: 565: 564: 563: 556: 540: 537: 536: 535: 530: 524: 516: 513: 512: 511: 508: 501: 500: 497: 492: 489: 488: 487: 476: 465: 462: 460: 457: 456: 455: 449: 443: 434: 428: 425:Formal methods 422: 416: 410: 402: 399: 395:performability 358: 355: 354: 353: 350: 347: 339: 336: 314: 313: 310: 307: 304: 295: 292: 283: 282: 278: 274: 265: 262: 232: 231: 225: 219: 213: 207: 180: 177: 175: 172: 110: 107: 106: 105: 99: 93: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2024: 2013: 2010: 2008: 2005: 2003: 2000: 1998: 1995: 1993: 1990: 1988: 1985: 1984: 1982: 1967: 1959: 1957: 1949: 1947: 1939: 1938: 1935: 1929: 1926: 1924: 1921: 1919: 1916: 1914: 1911: 1909: 1906: 1904: 1901: 1899: 1896: 1894: 1891: 1889: 1886: 1884: 1881: 1879: 1876: 1874: 1871: 1869: 1866: 1864: 1861: 1859: 1856: 1854: 1851: 1849: 1846: 1844: 1841: 1839: 1836: 1834: 1831: 1830: 1828: 1824: 1818: 1815: 1813: 1810: 1808: 1805: 1803: 1802:Mixed reality 1800: 1798: 1795: 1793: 1790: 1788: 1785: 1783: 1780: 1779: 1777: 1775: 1771: 1765: 1762: 1760: 1757: 1755: 1752: 1750: 1747: 1745: 1742: 1741: 1739: 1737: 1733: 1727: 1724: 1722: 1719: 1717: 1714: 1712: 1709: 1707: 1704: 1702: 1699: 1697: 1694: 1692: 1689: 1688: 1686: 1684: 1680: 1674: 1671: 1669: 1666: 1664: 1661: 1659: 1656: 1654: 1651: 1650: 1648: 1646: 1642: 1636: 1635:Accessibility 1633: 1631: 1630:Visualization 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1612: 1610: 1608: 1604: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1580: 1578: 1575: 1573: 1570: 1568: 1565: 1563: 1560: 1558: 1555: 1554: 1552: 1550: 1546: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1520: 1517: 1515: 1512: 1510: 1507: 1505: 1502: 1500: 1497: 1495: 1492: 1490: 1487: 1485: 1482: 1480: 1477: 1475: 1472: 1471: 1469: 1467: 1463: 1457: 1454: 1452: 1449: 1447: 1444: 1442: 1439: 1437: 1434: 1432: 1429: 1427: 1424: 1422: 1419: 1418: 1416: 1414: 1409: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1379: 1377: 1375: 1371: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1331: 1329: 1327: 1323: 1317: 1314: 1312: 1309: 1307: 1304: 1302: 1299: 1297: 1294: 1292: 1289: 1287: 1284: 1282: 1279: 1277: 1274: 1272: 1269: 1268: 1266: 1264: 1260: 1254: 1251: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1211: 1209: 1206: 1205: 1203: 1201: 1197: 1193: 1187: 1184: 1182: 1179: 1177: 1174: 1172: 1169: 1167: 1164: 1163: 1161: 1157: 1151: 1148: 1146: 1143: 1141: 1138: 1136: 1133: 1131: 1128: 1126: 1123: 1122: 1120: 1118: 1114: 1108: 1105: 1103: 1100: 1098: 1097:Dependability 1095: 1093: 1090: 1088: 1085: 1084: 1082: 1078: 1072: 1068: 1065: 1063: 1060: 1058: 1055: 1053: 1050: 1048: 1045: 1043: 1040: 1038: 1035: 1033: 1030: 1028: 1025: 1023: 1020: 1019: 1017: 1015: 1011: 1006: 1000: 996: 989: 984: 982: 977: 975: 970: 969: 966: 949: 945: 939: 936: 925: 921: 915: 912: 909: 908: 901: 898: 895: 894: 890: 887: 880: 877: 871: 868: 857: 853: 847: 844: 839: 835: 831: 825: 821: 817: 813: 809: 805: 798: 795: 791: 790:Brian Randell 785: 782: 776: 773: 769: 765: 764: 759: 758:Brian Randell 753: 750: 744: 741: 737: 736:Brian Randell 732: 729: 718: 714: 708: 705: 701: 697: 696:Brian Randell 691: 689: 685: 681: 677: 671: 668: 661: 656: 653: 649: 646: 643: 640: 636: 632: 629: 626: 622: 619: 616: 613: 610: 607: 604: 601: 598: 594: 592: 588: 585: 582: 578: 574: 571: 570: 566: 561: 557: 555: 554:0-387-82296-8 551: 547: 544:J.C. Laprie, 543: 542: 538: 534: 531: 528: 525: 522: 519: 518: 514: 509: 506: 505: 504: 498: 495: 494: 490: 486: 485: 481: 477: 474: 473: 468: 467: 463: 458: 453: 450: 447: 444: 438: 435: 432: 429: 426: 423: 420: 417: 414: 411: 408: 405: 404: 400: 398: 396: 391: 389: 388: 387:accessibility 382: 378: 376: 375: 374:survivability 370: 366: 365: 356: 351: 348: 345: 344: 343: 337: 335: 332: 330: 326: 323: 317: 311: 308: 305: 302: 301: 300: 293: 291: 287: 279: 275: 271: 270: 269: 263: 261: 258: 256: 252: 248: 244: 240: 236: 229: 226: 223: 220: 217: 214: 211: 208: 205: 202: 201: 200: 198: 194: 185: 178: 173: 171: 169: 165: 161: 157: 153: 148: 146: 142: 138: 133: 131: 127: 126:dependability 123: 118: 116: 108: 103: 100: 97: 94: 91: 88: 87: 86: 83: 80: 76: 71: 69: 68:dependability 65: 61: 57: 53: 49: 45: 41: 37: 36:dependability 33: 19: 1898:Cyberwarfare 1557:Cryptography 1096: 951:. Retrieved 947: 938: 927:. Retrieved 923: 914: 905: 900: 884: 879: 870: 859:. Retrieved 855: 846: 811: 807: 797: 784: 775: 770:, April 2001 761: 752: 743: 731: 720:. Retrieved 716: 707: 675: 670: 654: 638: 624: 605: 596: 590: 576: 559: 545: 502: 482: 470: 394: 392: 385: 383: 379: 372: 367:, e.g. with 362: 360: 341: 333: 327: 324: 318: 315: 297: 288: 284: 267: 259: 255:Availability 242: 237: 233: 204:Availability 197:Quantitative 190: 152:availability 149: 134: 129: 125: 119: 112: 101: 95: 89: 84: 72: 67: 59: 55: 51: 47: 43: 40:availability 39: 35: 29: 1908:Video games 1888:Digital art 1645:Concurrency 1514:Data mining 1426:Probability 1166:Interpreter 944:"SRDS-2021" 491:Conferences 338:Persistence 309:Forecasting 210:Reliability 193:Qualitative 156:reliability 130:reliability 122:reliability 44:reliability 1981:Categories 1966:Glossaries 1838:E-commerce 1431:Statistics 1374:Algorithms 1171:Middleware 1027:Peripheral 953:2021-08-01 929:2021-08-01 920:"DSN 2022" 861:2020-06-15 856:dl.acm.org 722:2021-06-08 662:References 303:Prevention 179:Attributes 90:Attributes 52:durability 1787:Rendering 1782:Animation 1413:computing 1364:Semantics 1062:Processor 838:195769468 641:2002–2004 623:SERENITY 312:Tolerance 251:Integrity 222:Integrity 2002:Security 1946:Category 1774:Graphics 1549:Security 1218:Compiler 1117:Networks 1014:Hardware 889:Archived 648:Archived 645:ANIKETOS 603:HIDENETS 595:ESFORS, 515:Journals 401:See also 168:security 143:and the 60:security 2012:Quality 1956:Outline 573:DESEREC 306:Removal 264:Threats 241:, i.e. 109:History 96:Threats 1992:Safety 836:  826:  633:, and 612:RESIST 552:  475:, 2002 464:Papers 253:, and 216:Safety 164:safety 139:, the 62:. In 56:safety 1359:Logic 1200:tools 834:S2CID 812:11615 674:IEC, 635:STILT 618:RODIN 587:NODES 539:Books 294:Means 102:Means 79:TC 56 1198:and 1071:Form 1067:Size 824:ISBN 550:ISBN 437:RAMS 166:and 73:The 58:and 816:doi 581:FP6 369:SOA 195:or 30:In 1983:: 1069:/ 946:. 922:. 854:. 832:. 822:. 806:. 760:: 715:. 687:^ 678:, 637:, 589:, 579:, 575:, 249:, 158:, 154:, 147:. 132:. 66:, 54:, 46:, 42:, 34:, 1007:. 987:e 980:t 973:v 956:. 932:. 864:. 840:. 818:: 725:. 20:)

Index

Dispatch reliability
systems engineering
real-time computing
International Electrotechnical Commission
TC 56
Oxford English Dictionary
reliability
International Conference on Dependable Systems and Networks
International Symposium on Reliable Distributed Systems
International Symposium on Software Reliability Engineering
availability
reliability
maintainability
safety
security

Qualitative
Quantitative
Availability
Reliability
Safety
Integrity
Maintainability
Confidentiality
Confidentiality
Integrity
Availability
Fault Tolerance
information systems
SOA

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑